Security in industrial environment - Kaspersky Lab · PAGE 1 | Gradient colors 14 149 115 0 121 91...
Transcript of Security in industrial environment - Kaspersky Lab · PAGE 1 | Gradient colors 14 149 115 0 121 91...
PAGE 1 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
PAGE 2 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
There is a huge number of problems of the
critical infrastructures connected with
information security
There is a risk of fatal consequences
associated with the failure of ICS of critical
infrastructures
KL initiated a project to improve the level of
information security in critical infrastructures
Industrial Control System (ICS) – – a security point of view
PAGE 3 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
++++
PLC – soft, hardware
Источник: http://www.us-cert.gov/control_systems/practices/documents/Defense_in_Depth_Oct09.pdf
ICS software
Office Soft
ICS protocols People
ICS components – a security point of view
US ICS-CERT (Defense in Depth): Cumulative scheme
1 2 3 PAGE 4 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Allen-Bradley: ControlLogix & MicroLogix Schneider Electric: Modicon Quantum General Electric: D20ME Schweitzer: SEL-2032 Koyo: Direct LOGIC H4-ES
Source: http://www.wired.com/threatlevel/2012/01/scada-exploits/
– exist, easily exploited – exist, difficult to exploit – vulnerability not discovered
ICS components – a security point of view
PLC vulnerabilities - Digital Bond research
1 2 3 PAGE 5 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
ICS components – a security point of view
Source: http://secunia.com/advisories/search/?search=scada
Software vulnerabilities – Secunia Found: 44 Secunia Security Advisories, displaying 1-25
1 2 3 PAGE 6 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
ICS components – a security point of view
Source: http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf
Software vulnerabilities – Positive Technologies
1 2 3 PAGE 7 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
ICS components – a security point of view
Source: http://www.ida.liu.se/~rtslab/iisw04/camready/SCADA-Attack-Trees-Final.pdf
Protocol vulnerabilities
Most SCADA protocols were designed long before network security perceived to be a problem.
1 2 3 PAGE 8 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
ICS components – a security point of view
Personnel “vulnerabilities”
1 2 3 PAGE 9 |
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
ICS components – a security point of view
PLC – soft, hardware ICS software ICS protocols People
PLC – soft, hardware ICS software ICS protocols People
PLC ICS software ICS protocols People
PLC ICS software ICS protocols People
PLC ICS software ICS protocols People Office Soft
PLC – soft, hardware ICS software ICS protocols People Office Soft
US ICS-CERT (Defense in Depth): Cumulative scheme
PAGE 10 | 1 2 3
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
What is the problem?
Since our goal is to improve a secure level of
industrial control system, seems we have a problem
ICS does not have single trusted component at all
problem is very simple:
1 2 3 PAGE 11 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Possible solution
Step by step improve all and each system
component to prepare excellent ICS • how much resources do we need to employ?
• how much time do we need?
Do customers want to substitute their working but
non secure systems with trusted one but not proved
it works well?
1 2 3 PAGE 12 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Possible solution
Constantly research new vulnerabilities and quickly
offer adequate countermeasures • such an approach requires customers to continuously
update the IT environment
• with such a reactive approach what is the price of a
single unprotected vulnerability?
Are customers willing to jeopardize their systems
with a continuously changing control environment?
1 2 3 PAGE 13 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Possible solution
Use simple and trusted unit to monitor all interactions
in regular ICS network • use it as trusted base to build complex trusted systems
Do customers want to improve the security of their
functioning systems without making significant
changes?
1 2 3 PAGE 14 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Why KL thinks about secure OS
Simplified scheme of anti-malware battle • bad guys:
1. find vulnerability
2. find a way how to exploit it
• good guys release a method to neutralize it
We always lag behind in this game
To be a leader we have to change game rules
New game rules – new OS
PAGE 15 | 1 2 3
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Secure OS
Now we at Kaspersky Lab have proprietary secure OS
• developed “from scratch”
• developed with “security in mind”
• micro kernel architecture
• highly modular approach
• no direct or uncontrolled communications between any two
modules, regardless of system or user level
• run any piece of software, both system and user level, in a secure
sandbox with clear security rules
• behavior of any module is compared to the predefined scenario
• guaranteed impossibility of run undeclared behavior
1 2 3 PAGE 16 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Secure OS
Principles of OS architecture
1 2 3 PAGE 17 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Trusted filtration system prototype
Tru
ste
d z
one
1 2 3 PAGE 18 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Trusted filtration system prototype features
Main purpose: to check if technological process remains in
the boundaries of predefined behavior
• means for describe correct technological process
• logical devices with properties and limitations
• device grouping with limitations on the every level
• mapping the limits of technological process to the control
information streams
• track the event chains
• customizable system of alerts and notifications
1 2 3 PAGE 19 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Trusted filtration system prototype
Tru
ste
d z
on
e
Tru
ste
d z
one
Trusted zone
Tru
ste
d z
one
Tru
ste
d z
one
1 2 3 PAGE 20 |
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Gradient colors
14
149
115
0
121
91
13
137
105
R
G
B
Diagrams
142
230
0
127
205
0
137
222
0
R
G
B
242
174
107
255
131
0
240
161
82
R
G
B
166
166
166
140
140
140
159
159
159
R
G
B
207
19
149
177
18
128
202
20
146
R
G
B
1
152
255
0
137
230
0
122
201
R
G
B
0
63
137
0
59
130
0
44
95
R
G
B
103
66
148
87
55
125
75
48
108
R
G
B
241
93
104
237
41
57
238
68
80
R
G
B
164
208
197
45
136
113
0
109
85
0
93
69
R
G
B
Tables
0
130
102
0
109
85
R
G
B
230
234
232
201
213
207
182
197
190
171
188
179
R
G
B
220
22
64
195
19
57
183
18
52
R
G
B
Competitors
254
208
106
253
182
17
228
158
2
R
G
B
Thank you!
Questions ?